Static task
static1
Behavioral task
behavioral1
Sample
1a482f65215870bf4c722ab546ae5a915bb184b125bd36cdce0d85a9633c30b4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1a482f65215870bf4c722ab546ae5a915bb184b125bd36cdce0d85a9633c30b4.exe
Resource
win10v2004-20220901-en
General
-
Target
1a482f65215870bf4c722ab546ae5a915bb184b125bd36cdce0d85a9633c30b4
-
Size
824KB
-
MD5
0cd035298fa28d2a95bb0e97f68b1d85
-
SHA1
31a59899c29e6ad83a361e6c8eabdd0a91460dc1
-
SHA256
1a482f65215870bf4c722ab546ae5a915bb184b125bd36cdce0d85a9633c30b4
-
SHA512
164b57bc3dad164cb4b2f1e556b43cd64b0990630966ff32172f7efcb7fe61b32f8d31a9e1af99b71fcbd0d4cf3252eb3ad5ed9735f09170759f1d069032ba42
-
SSDEEP
24576:GxCpXgEASi0HKtEY8nMN1nyX7s4O4aCSZWFd:GwpQNSinOYv5MZODP2d
Malware Config
Signatures
Files
-
1a482f65215870bf4c722ab546ae5a915bb184b125bd36cdce0d85a9633c30b4.exe windows x86
a60ff2521a75afe4fa293f9826e0e667
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleCount
LeaveCriticalSection
IsValidCodePage
FreeLibrary
GetUserDefaultLCID
SetStdHandle
GetCurrentThread
GetCommandLineA
FreeEnvironmentStringsW
QueryPerformanceCounter
CommConfigDialogW
ReadFile
FlushFileBuffers
GetEnvironmentStrings
GetUserDefaultLangID
LocalFree
HeapSize
GetModuleFileNameA
WideCharToMultiByte
OpenMutexA
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetACP
CreateFileA
GetTimeFormatA
InterlockedExchange
IsBadReadPtr
RtlUnwind
SetLastError
LoadLibraryA
LCMapStringA
GetCPInfo
CloseHandle
WriteFile
HeapAlloc
GetFileType
IsDebuggerPresent
GetDateFormatA
GetModuleHandleW
GetModuleHandleA
CreateMutexA
DeleteCriticalSection
GetTimeZoneInformation
DuplicateHandle
GetCurrentProcess
UnhandledExceptionFilter
EnterCriticalSection
GetSystemTimeAsFileTime
GetCurrentThreadId
GetOEMCP
GetFileAttributesExW
SetEnvironmentVariableA
HeapCreate
GetProcessHeap
SetFilePointer
CompareStringW
GetLocaleInfoA
SetConsoleCtrlHandler
GetLastError
GetStringTypeA
IsValidLocale
WriteConsoleW
SetUnhandledExceptionFilter
GetCurrentProcessId
VirtualFree
GetProcAddress
WriteConsoleA
GetStartupInfoA
InterlockedIncrement
HeapDestroy
ExitProcess
TlsSetValue
TlsAlloc
GetTickCount
EnumSystemLocalesA
GetConsoleCP
GetStdHandle
MultiByteToWideChar
TerminateProcess
GetMailslotInfo
CompareStringA
InterlockedDecrement
GetConsoleOutputCP
TlsGetValue
Sleep
TlsFree
GetStringTypeW
GetConsoleMode
HeapReAlloc
LCMapStringW
VirtualAlloc
FreeEnvironmentStringsA
GetComputerNameW
GetLocaleInfoW
AllocConsole
VirtualQuery
HeapFree
gdi32
Chord
LPtoDP
SetBitmapDimensionEx
SelectClipPath
AbortPath
SetMapMode
Ellipse
EnableEUDC
OffsetRgn
ExtEscape
GetCharWidth32A
GetTextExtentExPointA
GetTextMetricsW
SetPolyFillMode
wininet
LoadUrlCacheContent
SetUrlCacheEntryGroup
comctl32
InitCommonControlsEx
DrawStatusTextA
ImageList_GetDragImage
CreatePropertySheetPage
ImageList_DragLeave
user32
GetClassWord
GetDlgItemInt
DlgDirSelectComboBoxExW
DefWindowProcW
MapVirtualKeyExW
SendDlgItemMessageW
UnregisterClassA
SendMessageTimeoutA
DdeCmpStringHandles
EnumWindowStationsA
CreateWindowStationW
SetLastErrorEx
ChangeMenuA
ShowWindow
MessageBoxW
SetWindowsHookA
RegisterClassA
CallMsgFilter
CreateWindowExA
ScrollWindowEx
GetWindowTextLengthW
GetClassNameW
GetMessageA
LoadIconA
GetWindowLongA
RegisterDeviceNotificationA
CreateIcon
InflateRect
CreateDialogParamA
UnpackDDElParam
SetScrollInfo
SendIMEMessageExA
GetMenuItemInfoA
DrawFrame
GetComboBoxInfo
RegisterClassExA
SetDlgItemTextA
SetWindowPlacement
IsMenu
DestroyWindow
Sections
.text Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 388KB - Virtual size: 386KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ